MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0fa1bb23359cd60ec6c393705037b24e00c72846bc8c0f48dc4d412b0d39b350. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 0fa1bb23359cd60ec6c393705037b24e00c72846bc8c0f48dc4d412b0d39b350
SHA3-384 hash: fa2fd8db144a5bb2ef2936d8bf982efbe0258dfb7aa4e2527e4cef0c517522ad32ed136da6305d72801aa3c21fec9d6c
SHA1 hash: ac0fb3e540d6330f04db8913eb28b47941d156f8
MD5 hash: c9f83092e4eec354094028a5a322b2ff
humanhash: five-louisiana-thirteen-connecticut
File name:CI PL 2021 shipment for correction,pdf.zip
Download: download sample
Signature AgentTesla
File size:5'705'185 bytes
First seen:2021-02-23 07:20:58 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 98304:2/swj8f1p/G5MUpIQY9H6L7u0nCWP0knH6tUk8t3sDR4hE9yKISNtDoP/z/cyaGm:2/VSjGuUyZ9Yn9HHxhsDEKuP/rvO
TLSH 09463387C5B163118594BB172B085FAC7C786EE7FED3E297CA7B012F7269184A131C98
Reporter abuse_ch
Tags:zip


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: [154.127.53.215]
Sending IP: 154.127.53.215
From: Sara<s.zennaro@omn.it>
Reply-To: bur.staten@bk.ru
Subject: Re: re: Correction
Attachment: CI PL 2021 shipment for correction,pdf.zip (contains "CI & PL 2021 shipment for correction,pdf.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
93
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2021-02-23 07:21:15 UTC
AV detection:
3 of 47 (6.38%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

zip 0fa1bb23359cd60ec6c393705037b24e00c72846bc8c0f48dc4d412b0d39b350

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments